Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Impact of computers on society
Impact of computers on society
the internet and crime
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Impact of computers on society
Introduction
1.1 Background
Computers are the core technology of our times and apparently, the most important technology to be invented and used by man . Without computers and computer networks, especially, the Internet, activities of most organizations, such as banks, schools, government agencies would simply grind to a halt. Modern society's dependence on the use of information technology, make it more vulnerable to computer malfunction caused by unreliable software and to computer misuse (Forrester and Morrison, 2001). According to Forrester and Morrison (2001), this unethical use of computer have created a whole new range of social problems, which include computer crime, software theft, hacking, the creation of viruses, invasion of privacy, overreliance on intelligent machines and workplace stress.
This unethical behaviour related to Information System (IS) have caused significant losses to businesses and the society at large. Professional IT bodies are concerned about these ethical problems because of their potential harm to the society and to the integrity of the IT profession. The Association Computing Machinery (ACM), Institute of Electrical and Electronics Engineers (IEEE), the British Computer Society and International Federation for Information Processing (IFP) came together to formulate codes of ethics and professional conduct for IT professionals, as a way to check or reduce unethical conduct in the IT profession. The 1991 report of the ACM/IEEE-CS Curriculum Task Force recommended the introduction of computer ethics into Computer Science Curriculum at University level (Martin & Yale-Weltz, 1999). The report stressed the importance to expose students to ethical and societal issues that are associated with the co...
... middle of paper ...
...is study, the following research questions were formulated:
Do they see some of their activities as computer crime?
Has the teaching of computer ethics changed their perception of computer crime?
Does age and gender affect students' judgment of what they perceive as computer crime?
What are the similarities and differences between the findings of this study and that of related studies
1.4 Limitations of the Study
This study evaluates computer ethics awareness among university students. It involves only students of masters in Computer and Systems Science Stockholm University. Other graduate students are excluded from the study. These group of students were chosen because they are readily accessible by the researcher and due to limited time that is available for the conduct of the study. The scope of the study is limited to computer crimes aspect of computer ethics.
The Software Engineering Code of Ethics and Professional Practice is the public policy developed by the IEEE Computer Society (CS) and the Association of Computer Machinery (ACM). The IEEE-CS is dedicated to “advancing the theory, practice, and application, of computer and information processing technology.” 3 With more than 100,000 members, it hails itself as the world's leading organization of computer professionals. The ACM serves the same purpose as the IEEE-CS but also encompasses membership for computing students. Both organizations are highly respected among the engineering community and both include membership and offices worldwide.
Ethics is part of philosophy that deals with how human actions is considered to be wrong or right and technology makes it possible for individuals and institutions to behave in ways they couldn't possible do without technology. Computer ethics brings these unexplored areas of ethics into focus.
The first one is the public. Software engineers should make sure to act with the public interest in mind. Next is the client and employer. In addition to acting with the public interest in mind, the software engineer must also act in a manner with the best interests of the client and employer. The software engineer must also ensure that their products meet the highest professional standards. In addition to that, they should maintain integrity and independence in their professional judgment. The fifth concept, management, states that managers should promote an ethical approach to the management of software development. The next concept states that it is the job of the software engineers to advance the integrity and reputation of the profession. The next concept states that software engineers shall be fair and supportive of their colleagues. The eighth and final concept states that software engineers should constantly learn more about their profession and promote an ethical approach to the practice of the profession (Gotterban). This code was adopted by societies such as the ACM and IEEE-CS and some people question whether or not it is comprehensive. I believe that the SECEPP is a coherent and comprehensive code of ethics for the computing and IT profession because it can help evaluate whether or not
Computer technology brought upon many unexpected ethical issues. When discussing about ethics, we need to talk about the importance of computers and be able to answer questions like: what is the reason for addressing the impact of computers on ethics? In his article “What is computer ethics?” Dr. James Moor analyzed and elaborated the very question. Dr. Moor begins his article by defining computer ethics. In his words, “computer ethics is the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of politics for the ethical use of such technology” (James Moor, 1985). Moor indicated that as computer technology became more entwined with people and their everyday activities, the ethical challenges would become more difficult to conceptualize and do not lend themselves to the development of a static set of rules (Moor, 1985).
The computer is considered one of the most technological advances of the twentieth century. As the general public becomes increasingly ‘computer literate,' the gap between technology and peoples' intellect notably shrinks. The readily available computers, software, and assorted output devices have enlightened many but, in turn, have increased the using of computers for unethical activities, privacy invasion and illegal purposes. Legal sanctions against abusive use of computers are a reactive approach. A proactive approach is to teach students about computer ethics in classrooms. An effective teaching method are the presentation of ethical scenarios. It is anticipated that through this method, students will personalize the need for developing ethical standards of behavior. The ultimate goal is for students, if necessary, to change their set of personal beliefs to include ethics.
Verschoor, Curtis C. 2006. The Value of an Ethical Corporate Culture. Strategic Finance 88 (5): 21-3.
This case study paper will examine the Hacking Into Harvard Case where actions executed by college students jeopardized their potential opportunities to further their education at selected universities. The purpose of this study is to look at the moral issue that raises concern; which is whether the college students unauthorized actions should qualify as unethical behavior amongst the business schools or should the actions of the students be justified by shifting the blame of unethical behavior to the arms of the business schools and their third party application software.
This essay will discuss some of the Social, Ethical and Legal issues that an IT (Information Technology) Professional will likely face during their career in the Information Technology Sector. Furthermore, I will talk about how these issues affect professionals and how they could approach these challenges to try finding feasible solutions for them.
Reynolds, G. (2012). Ethics in information technology ( 4th ed.). Boston, MA: Course Technology, Cengage.
Mike Freeman, (2002) "Ethical Issues of Information Technology", New Library World, Vol. 103 Iss: 1/2, pp.72 – 75
Tavani, Herman T. "Chapter 4 :Professional Codes of Ethics and Codes of Conduct." Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing. Hoboken, NJ: Wiley, 2010. Print.
Computers; they are a part of or in millions of homes; they are an intricate part of just about every if not all successful businesses, the government, and the military. Computers have become common place in today’s society and the lives of the people who live in it. They have crossed every national, racial, cultural, educational, and financial barrier, which consequently ushered in the information age. A computer is a programmable electronic device that can store, retrieve and process data, and they come in all shapes, and sizes. They can be used for and in just about anything. As stated before, they are used in just about every aspect of modern society. They are so fundamental to modern society that it would be disastrous to society without them. As stated before, there are many areas in modern society that are run by computers. They play an intricate part of millions of homes in the world. Office workers in business, government and the military may use them to write letters, keep rosters, create budgets, find information, manage projects, communicate with workers, and so on. They are used in education, medicine, music, law enforcement, and unfortunately crime. Because computers have become such a part of the world and how it operates, there is a tremendous responsibility for those who are in control of these computers and the vital information that they carry, to manage and protect them properly. This is management and protection is vital because any loss or damage could be disastrous for the affected entity. For example, a mistake or intentional alteration of a personal credit file could affect ones ability to buy a car or home, or can lead to legal actions against the affected person until the mistake or intentional alteration has been corrected. Therefore, with the advent of computers in the information age, and all of the intentional and unintentional violations against them, comes the need to safeguard them and the information they carry with strong systems and policies of computer security.
The key issues of problems surrounding the application of ICT are: privacy, ownership, the responsibility, professionalism, social implications and values. It is beyond doubt that there are benefits of new technologies such as industry development, going to the moon, e- learning systems and improved diagnosis in various fields. Technology is advancing inevitable and with new advancement it creates a vacuum in the new legislation which is not always easy to deal with. The British Computer Society (BCS) and other professional computer organisations such as the Association of Computing Machinery (ACM) recognise the need for today’s graduates to be aware of the issues surrounding the use of computers in all aspects of society. The BCS is committed to raising the awareness of future computing professionals and requires that the social, legal...
aspect of our lives, we are faced with computers. They are in our classrooms, cars, and even used
The advantages of technology and the internet have led more criminals to use cyberspace to commit crimes. The threat of cybercrime is increasing as globalization continues to spread across the world. While the impact of globalization has led to amazing, new discoveries throughout the world, Internet connectivity has also made cybercrime easier. America and the rest of the world have become more reliant on technology and use it in more aspects of their lives, technology-users make themselves more vulnerable to cyber attacks. Globalization and the growing use of computers in the world have given people a motive to learn more about computing and become more knowledgeable as programmers. As these people learn more, there is a risk that they will use their new intelligence to commit cybercrimes.